US8502731B2 - System and method for moving target detection - Google Patents

System and method for moving target detection Download PDF

Info

Publication number
US8502731B2
US8502731B2 US13/008,549 US201113008549A US8502731B2 US 8502731 B2 US8502731 B2 US 8502731B2 US 201113008549 A US201113008549 A US 201113008549A US 8502731 B2 US8502731 B2 US 8502731B2
Authority
US
United States
Prior art keywords
image
cfar
window
clusters
morphological
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related, expires
Application number
US13/008,549
Other versions
US20120182173A1 (en
Inventor
Anthony Frank Martone
Kenneth Irving Ranney
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
US Department of Army
Original Assignee
US Department of Army
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by US Department of Army filed Critical US Department of Army
Priority to US13/008,549 priority Critical patent/US8502731B2/en
Assigned to ARMY, THE UNITED STATES OF AMERICA AS REPRESENTED BY THE SECRETARY OF THE reassignment ARMY, THE UNITED STATES OF AMERICA AS REPRESENTED BY THE SECRETARY OF THE ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: MARTONE, ANTHONY F., RANNEY, KENNTH I.
Priority to US13/233,434 priority patent/US9057783B2/en
Publication of US20120182173A1 publication Critical patent/US20120182173A1/en
Application granted granted Critical
Publication of US8502731B2 publication Critical patent/US8502731B2/en
Expired - Fee Related legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S13/00Systems using the reflection or reradiation of radio waves, e.g. radar systems; Analogous systems using reflection or reradiation of waves whose nature or wavelength is irrelevant or unspecified
    • G01S13/88Radar or analogous systems specially adapted for specific applications
    • G01S13/887Radar or analogous systems specially adapted for specific applications for detection of concealed objects, e.g. contraband or weapons
    • G01S13/888Radar or analogous systems specially adapted for specific applications for detection of concealed objects, e.g. contraband or weapons through wall detection
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S13/00Systems using the reflection or reradiation of radio waves, e.g. radar systems; Analogous systems using reflection or reradiation of waves whose nature or wavelength is irrelevant or unspecified
    • G01S13/02Systems using reflection of radio waves, e.g. primary radar systems; Analogous systems
    • G01S13/0209Systems with very large relative bandwidth, i.e. larger than 10 %, e.g. baseband, pulse, carrier-free, ultrawideband
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S13/00Systems using the reflection or reradiation of radio waves, e.g. radar systems; Analogous systems using reflection or reradiation of waves whose nature or wavelength is irrelevant or unspecified
    • G01S13/02Systems using reflection of radio waves, e.g. primary radar systems; Analogous systems
    • G01S13/50Systems of measurement based on relative movement of target
    • G01S13/52Discriminating between fixed and moving objects or between objects moving at different speeds
    • G01S13/538Discriminating between fixed and moving objects or between objects moving at different speeds eliminating objects that have not moved between successive antenna scans, e.g. area MTi
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S13/00Systems using the reflection or reradiation of radio waves, e.g. radar systems; Analogous systems using reflection or reradiation of waves whose nature or wavelength is irrelevant or unspecified
    • G01S13/66Radar-tracking systems; Analogous systems
    • G01S13/72Radar-tracking systems; Analogous systems for two-dimensional tracking, e.g. combination of angle and range tracking, track-while-scan radar
    • G01S13/723Radar-tracking systems; Analogous systems for two-dimensional tracking, e.g. combination of angle and range tracking, track-while-scan radar by using numerical data
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S13/00Systems using the reflection or reradiation of radio waves, e.g. radar systems; Analogous systems using reflection or reradiation of waves whose nature or wavelength is irrelevant or unspecified
    • G01S13/88Radar or analogous systems specially adapted for specific applications
    • G01S13/89Radar or analogous systems specially adapted for specific applications for mapping or imaging
    • G01S13/90Radar or analogous systems specially adapted for specific applications for mapping or imaging using synthetic aperture techniques, e.g. synthetic aperture radar [SAR] techniques
    • G01S13/9021SAR image post-processing techniques
    • G01S13/9029SAR image post-processing techniques specially adapted for moving target detection within a single SAR image or within multiple SAR images taken at the same time
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S7/00Details of systems according to groups G01S13/00, G01S15/00, G01S17/00
    • G01S7/02Details of systems according to groups G01S13/00, G01S15/00, G01S17/00 of systems according to group G01S13/00
    • G01S7/28Details of pulse systems
    • G01S7/285Receivers
    • G01S7/292Extracting wanted echo-signals
    • G01S7/2923Extracting wanted echo-signals based on data belonging to a number of consecutive radar periods

Definitions

  • the embodiments herein generally relate to detection, and more particularly, to detection of moving targets.
  • UWB ultrawideband
  • ARL Technical Report 5037 discloses a description of a moving target indication (MTI) processing approach to detect and track slow-moving targets inside buildings, which successfully detected moving targets (MTs) from data collected by a low-frequency, ultrawideband radar.
  • MMI moving target indication
  • MTI processing algorithms include change detection (CD), used to identify the MT signature; automatic target detection (ATD), used to eliminate imaging artifacts and potential false alarms due to target multi-bounce effects; clustering, used to identify a centroid for each cluster in the ATD output images; and tracking, used to establish a trajectory of the MT.
  • CD change detection
  • ATD automatic target detection
  • clustering used to identify a centroid for each cluster in the ATD output images
  • tracking used to establish a trajectory of the MT.
  • the algorithms in the MTI processing formulation can be implemented in a real-time or near real-time system; however, a person-in-the-loop is needed to select input parameters for the k-Means clustering algorithm.
  • the number of clusters input into the k-Means routine is unknown and requires manual selection.
  • two techniques are investigated that automatically determine the number of clusters: the knee-point (KP) algorithm and the recursive pixel finding (RPF) algorithm.
  • KP knee-point
  • RPF recursive pixel finding
  • the KP algorithm is a well-known heuristic approach for determining the number of clusters.
  • the RPF algorithm is analogous to the image processing, pixel labeling procedure. Both routines processed data collected by low-frequency, ultrawideband radar.
  • a time-domain approach to MTI was considered as an alternative to a frequency-domain approach, i.e., Doppler processing, since a very small Doppler shift in backscattered frequency is generated due to (1) the slow motion of the mover and (2) the low frequency needed to penetrate through the wall.
  • the reported time-domain processing algorithms are based on the change detection (CD) paradigm, which is inherently similar to clutter cancellation.
  • CD change detection
  • the Synchronous Impulse Reconstructive (SIRE) radar remains stationary and generates a set of images for a region of interest (ROI). Each image in the set is formed every two-thirds of a second.
  • the stationary objects in the building remain in the same location in each image; however, moving personnel will be at different locations.
  • the moving personnel can be detected by subtracting adjacent images in the set, thereby eliminating the stationary objects and identifying the MT signature.
  • Additional processing is needed to enhance the MT signature and includes a constant false alarm rate (CFAR) algorithm, morphological processing, k-Means clustering, and a tracking algorithm.
  • CFAR and morphological processing are approaches used to eliminate imaging artifacts and potential false alarms due to target multi-bounce effects.
  • the k-Means clustering algorithm is used to identify centroids for given input clusters, where the clusters are produced by the CFAR and morphological processing algorithms.
  • the tracker is used to establish a trajectory of the MT based on the input centroids.
  • Synchronous Impulse Reconstruction (SIRE) Radar is a low-frequency, ultra-wideband (UWB) radar having a frequency range of 300 MHz ⁇ 3 GHz.
  • An example of SIRE system is illustrated in FIG. 1 , showing 2 transmitters and 16 receivers in an antenna array 2 m wide having an average power of 5 mW with a downrange swath is 10-meters and a downrange resolution is 0.056 meters.
  • a preferred embodiment of the present invention comprises a cluster prediction algorithm for a system to automatically detect and track moving personnel inside buildings.
  • the novel cluster prediction algorithm inter alia, 1) automatically determines the number of clusters in an image (where each cluster corresponds to a potential moving target), 2) reduces false alarms, and 3) automates the entire moving target indication (MTI) system.
  • MTI moving target indication
  • This fully automated MTI system can be utilized to detect and track hostile personnel, enemy snipers, or hostages inside buildings.
  • the MTI system could also be used for commercial applications that include: 1) law enforcement, 2) search and rescue, 3) building surveillance, 4) vehicle tracking on highways or in remote locations.
  • the MTI system effectively combines several algorithms in a novel way to image slow and fast moving personnel from 6 m to 30 m inside building structures.
  • the MTI system has successfully demonstrated detection capabilities of personnel walking inside wood and cinderblock buildings.
  • the moving target indication (MTI) system is comprised of two main components.
  • the first component detects potential moving targets by generating a time series of binary images that contain clusters.
  • the second component of the MTI system tracks the centroid of each cluster thereby indicating any moving target in the building. Both components have been studied individually in past research, but could not be combined since the second component requires manual input. Specifically, the number of clusters in the binary images (output of the first component) is unknown and must be manually input into the second component of the system.
  • the cluster prediction algorithm i) automatically determines the number of clusters present in the binary images, ii) reduces false alarms in the binary images, iii) combines the first and second components of the MTI system thereby automating the entire MTI system.
  • the cluster prediction algorithm is a novel, necessary, and unique contribution to the MTI system.
  • a preferred method of detecting moving targets comprises transmitting electromagnetic waves rays from a plurality of transmitters at sequential; receiving reflected waves into a plurality of receivers after each transmission; the compilation of the reflected waves from the plurality of receivers for each transmission representing a data frame; forming a signal that monitors changes between the two sets of frames; at least one processor operating to process and compare frames; forming a difference image using a back-projection algorithm; scanning the difference image using a constant false alarm rate (CFAR) window; the CFAR window scanning the entire difference image and identifying a list of points of interest and eliminating the sidelobe artifacts present in the difference image thereby creating CFAR images; processing the CFAR images using morphological processing to create a morphological image; determining the number of clusters present in the morphological image; using K-means clustering to indicate the centroid of each cluster; and tracking using a Kalman filter.
  • CFAR constant false alarm rate
  • a preferred embodiment system for detecting moving targets comprises a plurality of M transmitters, a plurality of receivers, and at least one memory, the transmitters operating in sequence to transmit electromagnetic waves rays sequentially; the receivers receiving reflected waves after each transmission; the compilation of the reflected waves from the plurality of receivers for each transmission representing a data frame; at least one processor operating to perform the steps of: forming a signal that monitors changes between the two sets of frames; at least one processor operating to process and compare frames; forming a difference image using a back-projection algorithm; scanning the difference image using a constant false alarm rate (CFAR) window; the CFAR window scanning the entire difference image and identifying a list of points of interest and eliminating the sidelobe artifacts present in the difference image thereby creating CFAR images; processing the CFAR images using morphological processing to create a morphological image; determining the number of clusters present in the morphological image; using K-means clustering to indicate the centroid of each cluster; and tracking using a Kalman
  • the colors represent a decibel range which ranges from red to blue, red being the strongest signal and blue being the weakest.
  • FIG. 1 illustrates a schematic diagram of a vehicle having a synchronous Impulse Reconstruction (SIRE) Radar mounted thereon.
  • SIRE synchronous Impulse Reconstruction
  • FIG. 2 is a block diagram showing a moving target indication system for data collected by a low-frequency UWB radar with correlated illustrations.
  • FIG. 3 is a block diagram of a is a block diagram showing a moving target indication system for data collected by a low-frequency UWB radar including cluster prediction.
  • FIG. 4 illustrates two SAR images (a and b) of a target area with a moving target present; the location of the mover is unknown
  • FIG. 5 is an illustration of a difference image generated by applying change detection to the SAR images of FIG. 4 , wherein the moving target signature is identifiable.
  • FIG. 6 schematically illustrates an example of a CFAR window comprising an inner, guard and outer window.
  • FIG. 7 is a schematic illustration of a CFAR window placed over the MT signature, where the inner window is overlaid on the MT signature and the outer window covers the background of the local area.
  • the inner window contains pixels with higher energy compared with the pixels contained in the outer window.
  • FIG. 8A is an illustration comprising 6 ATR images with 2 clusters present per ATR image and wherein each “Error Line” corresponds to 1 image;
  • FIG. 8B is a graphical depiction of a knee point algorithm based upon FIG. 8A .
  • FIG. 9A is a schematic illustration revealing themorphological image that contains points of interest (POIs).
  • PIs points of interest
  • FIG. 9B is an illustration based upon FIG. 9A when these images are input into a clustering algorithm, two clusters are identified; the clusters and corresponding centroids are shown.
  • FIG. 10 is block diagram of the k-Means algorithm.
  • FIG. 13 is a schematic graphical illustration showing the knee point for the six images of FIG. 12 .
  • FIG. 15 is a schematic block diagram of the adaptive Knee point (KP) algorithm.
  • the preferred embodiment moving target indication (MTI) system is comprised of two main components.
  • the first component detects potential moving targets by generating a time series of binary images that contain clusters.
  • the second component of the MTI system tracks the centroid of each cluster thereby indicating any moving target in the building.
  • Both components have been studied individually in past research reported in A. Martone, et al., “Automatic Through the Wall Detection of Moving Targets using Low-Frequency Ultra-Wideband Radar,” Proceedings of the IEEE international radar conference, Washington, D.C., May 2010, A. Martone, et al., “An Analysis of Clustering Tools for Moving Target Indication; ARL-TN-5037; U.S. Army Research Laboratory: Adelphi, Md., November 2009, A.
  • the cluster prediction algorithm i) automatically determines the number of clusters present in the binary images, ii) reduces false alarms in the binary images, iii) combines the first and second components of the MTI system thereby automating the entire MTI system.
  • the cluster prediction algorithm is a novel, necessary, and unique contribution to the MTI system.
  • a time-domain processing system that utilizes a low-frequency, ultra-wideband (UWB) radar.
  • UWB ultra-wideband
  • a low-frequency, UWB radar is desired since the low-frequency transmit pulse is capable of penetrating the wall, as reported in Farwell, M., et al., “Sense through the wall system development and design considerations,” J. of the Franklin Institute September 2008, 345 (6), 570-591, hereby incorporated by reference, and the ultra-wideband corresponds to a high range resolution that gives the capability to better locate the moving target.
  • the time-domain approach to moving target indication (MTI) is utilized as an alternative to a frequency-domain approach, i.e. Doppler processing, since a very small Doppler shift in backscattered frequency is generated due to: 1) the slow motion of the mover and 2) the low frequency needed to penetrate the wall.
  • the MTI system is shown in FIG. 3 .
  • the MTI processing system consists of the following processing routines: change detection, image formation via a specially adapted version of the back-projection algorithm, constant false alarm rate (CFAR) processing, morphological processing, cluster prediction, k-Means clustering, and tracking via the Kalman filter.
  • CFAR constant false alarm rate
  • morphological processing cluster prediction
  • cluster prediction cluster prediction
  • k-Means clustering k-Means clustering
  • tracking via the Kalman filter a novel contribution to the MTI processing system.
  • the cluster prediction algorithm i) automatically determines the number of clusters present in the binary images, ii) reduces false alarms in the binary images, iii) combines the detection and tracking components of the MTI system thereby automating the entire system.
  • the constituent radar in our MTI system remains stationary and measures the energy reflected from an area under surveillance.
  • Downrange profiles are measured and buffered by each receive channel for a single set of transmit pulses. Since the transmitters fire in sequence, M downrange profiles are effectively buffered (one for each transmitter) from each receive channel, and the time required to assemble these profiles represents one frame of data. After buffering the data from one frame, another M downrange profiles are collected from each receive channel for the next frame of data.
  • r represents the downrange index
  • i represents the time index
  • j represents the transmitter index
  • k represents the receiver index.
  • a signal is formed that monitors changes between the two sets of downrange profiles measured at time i and time i+1 using transmitter j and receiver k; hence, the name of the model is a “change detection” (CD) paradigm.
  • the difference signal, ⁇ dot over (f) ⁇ i,j,k (r) (corresponding to the derivative in time), is then input to an image formation routine, in this case a time-domain back-projection procedure, resulting in the output difference image,
  • g(i,j,k) is a scaling function.
  • SAR Image 1 I 1 (x,y)
  • SAR Image 2 I 2 (x,y)
  • SAR Image 2 I 2 (x,y)
  • SAR images contain several artifacts making it difficult to identify the moving target.
  • the moving target is located by applying change detection.
  • the resulting difference image is shown in FIG. 5 . It is clear from the difference image that most of the artifacts due to stationary clutter have been eliminated and the resulting MT signature is identified.
  • CFAR is a well-established approach to eliminating potential false alarms.
  • the algorithm performs a test of local contrast that is designed to achieve a constant false alarm rate as reported in Khan, P. P. & Kassam, S. A., “Analysis of CFAR Processors in Homogeneous Background,” IEEE Transactions on Aerospace and Electronic Systems July 1988, 24 (4), 427-445, hereby incorporated by reference.
  • I diff x,y
  • a CFAR window is used to scan the difference image and test for the MT signature.
  • An example of a CFAR window is shown in FIG.
  • I X and I Y are the inner windows' cross-range and range dimensions, respectively; G X and G Y are the guard windows' cross-range and range dimensions; and O X and O Y are the outer windows' cross-range and range dimensions.
  • the inner window dimensions are designed so that it is overlaid on the MT signature.
  • the outer window dimensions are designed to be superimposed on the local background.
  • the guard window is used as a buffer between the inner and outer windows and ensures that large pixel values due to target sidelobes are not captured by the outer window. For example, consider the window that is placed in the difference image shown in FIG. 7 . As is illustrated in the figure, the inner window is overlaid on the MT signature pixels and the outer window is overlaid on the local background pixels.
  • the dimensions of the inner window constitute a small rectangular shape, which is different from the elliptical patterns of the MT signatures.
  • the rectangular shape is chosen since it is small enough to fit over the MT signatures.
  • the small rectangular window is used as an alternative to an elliptical window since the size and shape of the pattern of the moving target changes depending on the range and cross-range of the mover's position.
  • the CFAR window is placed in the difference image of size (500,500) and moved pixel by pixel over the entire difference image. Let the center of the CFAR window be positioned at coordinates (X, Y) in the difference image, where X ⁇ X /2 ⁇ , . . . (500 ⁇ O X /2 ⁇ ) ⁇ and Y ⁇ O Y /2 ⁇ , . . . (500 ⁇ O Y /2 ⁇ ) ⁇ .
  • ⁇ x ⁇ denotes the largest integer less than x for x>0 (i.e., floor), and ⁇ x ⁇ denotes the smallest integer greater than x for x>0 (i.e., ceiling).
  • the CFAR algorithm indicates an MT signature if the sum of the energy in the inner window is larger than the sum of the energy in the outer window. This is shown in FIG. 7 , where the energy of the pixels in the inner window is larger then the energy of the pixels in the outer window.
  • the inner window to outer window energy ratio is defined as
  • ⁇ ⁇ ( P ( l , k ) ) ⁇ P ( l , k ) , P ( l , k ) > ⁇ ⁇ , P ( l , k ) ⁇ ⁇ , ( 5 )
  • max(I diff (x,y))/2
  • max(I diff (x,y)) is the maximum pixel magnitude in the difference image.
  • the function ⁇ (P (l,k) ) is used to adjust the image background and require that the magnitude of each pixel is above the threshold defined by ⁇ , which is done to prevent errors due to division by very small numbers. Division by very small numbers artificially inflates the ratio defined by equation 3 and causes false positives.
  • the threshold ⁇ was chosen based on the observations of the sidelobes corresponding to the MT signature, which are typically less than max(I diff (x,y))/2 in magnitude. This choice of ⁇ eliminates the sidelobes by blending them into the background of the difference image.
  • the sum of the energy in the outer window is defined as
  • ⁇ o E W - E I + G , ⁇
  • the CFAR window scans the entire difference image and a list of POIs are identified. For example, consider the difference image and CFAR image of FIGS. 8A and 8B . The difference image is input into the CFAR algorithm and the CFAR image is output. The red cluster in the CFAR image corresponds to a group of POIs. This example illustrates that the CFAR algorithm identifies the MT signature and eliminates the sidelobe artifacts present in the difference image.
  • morphological processing is applied to further refine the number of clusters present in the CFAR images.
  • the morphological processing considered implements a dilation and erosion procedure. Dilation is used to grow the POI clusters and erosion is used to shrink the POI clusters.
  • the dilation process is designed to connect clusters in close proximity by dilating all pixels in each CFAR image. For dilation define a 17 ⁇ 17 dilation window ⁇ d is defined as:
  • the 17 ⁇ 17 dilation window size was chosen to connect clusters separated by a distance of 0.68 m or less (this distance was chosen based on observations of the clusters in the CFAR images). Similar to CFAR, a dilation test statistic is defined:
  • an 8 pixel buffer exists along the edge of the CFAR image (i.e. not enough samples exist at the edges of the image).
  • There exist i 1, . . . N ⁇ 1 dilation images; one for each CFAR image.
  • the k-Means algorithm is referenced Wilpon, J., et al., “A Modified K-means Clustering Algorithm for Use in Isolated Work Recognition,” IEEE Transactions on Acoustics, Speech and Signal Processing vol. 33, no. 3, July 1985, 587-594, hereby incorporated by reference.
  • the k-Means algorithm requires the number of clusters present in the morphological images and is provided by the cluster prediction algorithm described in the section entitled Cluster Prediction Algorithm.
  • a cluster is defined as a group of one or more POIs that are close to one another in the image. The total number of clusters present in the morphological image referred to as T. For example, consider the POIs in FIG.
  • FIG. 9A a morphological image where each POI corresponds to a blue diamond.
  • FIG. 9B The POIs connected to each other form a cluster as illustrated in FIG. 9B .
  • the k-Means algorithm is used to indicate the centroid of each cluster.
  • the k-Means algorithm identifies the centroids of the POIs by an iterative procedure. This iterative procedure minimizes the square-error between centroid estimates and their corresponding POIs. It should be noted that the clusters identified by the clustering algorithm are not unique and it is possible that the centroid locations differ for different iterations of the clustering algorithm.
  • a block diagram of the k-Means algorithm is shown in FIG. 10 .
  • the input morphological image contains a set of M POI vectors, where each vector is of size two and contains range and cross-range position information.
  • the k-Means algorithm begins by randomly generating T mean vectors and defining each mean vector to be a centroid location. Note that, at this point, T is unknown and must be manually defined. The adaptive KP algorithm can be leveraged to automatically determine T. The next step of the k-Means algorithm determines the mean vector nearest to each POI using the Euclidean distance measure. An error (offset) is then estimated between the mean vector and nearest POIs using the sum of squares (SOS) error criteria as referenced in Duta, R, et al., “Pattern Classification,” 2nd ed.
  • SOS sum of squares
  • This SOS error criterion is a measure of variance between the POI vectors and the nearest mean vectors and must be minimized. Once minimized, the SOS error indicates the final centroid estimates represented by the mean vectors. For example, consider the morphological image in FIG. 11 . In this example, two mean vectors were randomly generated and indicated by the red diamond and black star. As the k-Means algorithm iterates, several centroids are estimated. Each newly generated estimate corresponds to a smaller SOS error.
  • the red line indicates progression of the first mean vector and the black line indicates progression of the second mean vector. Multiple iterations are needed to minimize the error between the POIs and nearest mean vectors.
  • the tracker algorithm is intended to reduce the number of false alarms and segregate targets from both clutter and one another as they move inside a building.
  • the centroids generated by the clustering algorithm serve as inputs to the tracker; so it is possible to have multiple tracker inputs even when a single moving target is present. These centroids may indicate the true position of a moving target or false alarms.
  • the tracker estimates the correlation between each centroid and the existing tracks and then associates the existing tracks with the most highly correlated (i.e., most reasonable) centroid. Non-assigned centroids are used to initiate new tracks and outdated tracks are deleted.
  • a Kalman filter determines the present track position and predicts the next measurement.
  • the Knee-Point (KP) algorithm (i.e. non-adaptive) is one approach to automatically determine T for a particular morphological image.
  • the KP algorithm is a heuristic approach used to determine the optimal number of clusters as referenced in Thorndike, R. “Who belongs in the family?” Psychometrika December 1953, 18 (4), 267-276, and Zhao, Q. et al. “Knee Point Detection on Bayesian Information Criteria,” Proceedings of the 20th IEEE International Conference on Tools with Artificial Intelligence, vol. 2, November 2008, 431-438, hereby incorporated by reference.
  • the KP algorithm begins by repeating the k-Means algorithm for many different cluster number choices, where the maximum cluster number is denoted by C.
  • the ambiguity of the NMSOS errors motivates the need to adapt the KP algorithm to include training information.
  • the training information consists of NMSOS errors obtained by the KP-algorithm.
  • each NMSOS error in the training set contains a label, ⁇ 1, . . . C ⁇ , indicating T.
  • FIG. 15 A block diagram of the adaptive KP algorithm is shown in FIG. 15 .
  • the k-Nearest Neighbor (k-NN) classifier then utilizes the training set to automatically determine the number of clusters, i.e. N p , corresponding to the morphological image.
  • the k-NN classifier first estimates the distance between J morph and [J 1 , . . . J M ] based on Euclidean distance. The distance values are denoted as [ ⁇ d 1 , ⁇ 1 ⁇ , . . . ⁇ d M , ⁇ M ⁇ ], where
  • the distances are then sorted from smallest to largest to produce [ ⁇ S 1 , ⁇ 1 ⁇ , . . . ⁇ S M , ⁇ M ⁇ ], where S 1 corresponds to the smallest distance, ⁇ 1 corresponds to the label of the smallest distance, S M corresponds to the largest distance, and ⁇ M corresponds to the label of the largest distance.
  • the labels of the K smallest distances, [ ⁇ 1 , . . . ⁇ K ] are examined based on a majority vote.
  • [K 1 , K 2 , . . . K C ] as a set corresponding to the number of labels in [ ⁇ 1 , . . . ⁇ K ] of each class (where a class denotes T).
  • N p 1
  • the adaptive KP algorithm is capable of predicting the number of clusters present in the morphological image.
  • the adaptive KP algorithm reduces false alarms present in the morphological image.
  • FIG. 15 is a block diagram of the adaptive KP algorithm.
  • target means a person or persons, or portion thereof, animal or animals, object, or a combination thereof.
  • point of interest or “points of interest” refer to an signature or area in the image which appears to be a target but may or may not be a target; i.e., potentially the point of interest may be a target; subject to further processing or testing.
  • subimage or “sub image” means a portion of an image (also referred to herein as a patch), or the like.
  • the “energy” corresponds to the intensity of the image pixels.
  • processor includes computer, controller, CPU, microprocessor; multiprocessor, minicomputer, main frame, personal computer, PC, coprocessor, and combinations thereof or any machine similar to a computer or processor which is capable of processing algorithms.
  • process means: an algorithm, software, subroutine, computer program, or methodology.
  • algorithm means: sequence of steps using computer software, process, software, subroutine, computer program, or methodology.

Landscapes

  • Engineering & Computer Science (AREA)
  • Remote Sensing (AREA)
  • Radar, Positioning & Navigation (AREA)
  • Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Radar Systems Or Details Thereof (AREA)

Abstract

A system and method of detecting moving targets comprises transmitting electromagnetic waves rays from a plurality of transmitters at sequential; receiving reflected waves into a plurality of receivers after each transmission; the compilation of the reflected waves from the plurality of receivers for each transmission representing a data frame; forming a signal that monitors changes between the two sets of frames; at least one processor operating to process and compare frames; forming a difference image using a back-projection algorithm; scanning the difference image using a constant false alarm rate (CFAR) window; the CFAR window scanning the entire difference image and identifying a list of points of interest and eliminating the sidelobe artifacts present in the difference image thereby creating CFAR images; processing the CFAR images using morphological processing to create a morphological image; determining the number of clusters present in the morphological image; using K-means clustering to indicate the centroid of each cluster; and tracking using a Kalman filter. The system comprises a plurality of M transmitters, a plurality of receivers, and at least one memory, the transmitters operating in sequence to transmit electromagnetic waves rays sequentially; the receivers receiving reflected waves after each transmission; the compilation of the reflected waves from the plurality of receivers for each transmission representing a data frame; at least one processor operating to perform the method.

Description

STATEMENT OF GOVERNMENT INTEREST
The embodiments herein may be manufactured, used, and/or licensed by or for the United States Government without the payment of royalties thereon.
TECHNICAL FIELD
The embodiments herein generally relate to detection, and more particularly, to detection of moving targets.
BACKGROUND OF THE INVENTION
Security and military forces operating in urban environments need the capability to detect slow moving personnel inside buildings. To identify moving personnel inside buildings, a time-domain approach may be used that uses a low-frequency, ultrawideband (UWB) radar. A low-frequency, UWB radar is desired since the low-frequency transmit pulse is capable of penetrating through the wall (1) and the UWB corresponds to a high range resolution that gives the capability to better locate the moving target (MT). The publication entitled “An Analysis of Clustering Tools for Moving Target Indication,” by Anthony Martone, Roberto Innocenti, and Kenneth Ranney, Sensors and Electron Devices Directorate, Army Research Laboratory, Adelphi, Md., ARL-TR-5037, November 2009 (hereinafter ARL Technical Report 5037), hereby incorporated by reference, discloses a description of a moving target indication (MTI) processing approach to detect and track slow-moving targets inside buildings, which successfully detected moving targets (MTs) from data collected by a low-frequency, ultrawideband radar. MTI processing algorithms include change detection (CD), used to identify the MT signature; automatic target detection (ATD), used to eliminate imaging artifacts and potential false alarms due to target multi-bounce effects; clustering, used to identify a centroid for each cluster in the ATD output images; and tracking, used to establish a trajectory of the MT. These algorithms can be implemented in a real-time or near-real-time system; however, a person-in-the-loop is needed to select input parameters for the clustering algorithm. Specifically, the number of clusters to input into the cluster algorithm is unknown and requires manual selection. As reported in ARL Technical Report 5037 (page 1), the algorithms in the MTI processing formulation can be implemented in a real-time or near real-time system; however, a person-in-the-loop is needed to select input parameters for the k-Means clustering algorithm. Specifically, the number of clusters input into the k-Means routine is unknown and requires manual selection. In the ARL Technical Report 5037, two techniques are investigated that automatically determine the number of clusters: the knee-point (KP) algorithm and the recursive pixel finding (RPF) algorithm. The KP algorithm is a well-known heuristic approach for determining the number of clusters. The RPF algorithm is analogous to the image processing, pixel labeling procedure. Both routines processed data collected by low-frequency, ultrawideband radar.
In research reported in Martone, A.; et al., “Through the Wall Detection of Slow Moving Personnel,” Proceedings of the SPIE Conference on Radar Sensor Technology XIII, vol. 7308, Orlando, Fl, April 2009, and Martone, A. et al., “Moving Target Indication for Transparent Urban Structures,” ARL-TN-4809, U.S. Army Research Laboratory: Adelphi, Md., May 2009, the effectiveness of time-domain, moving target indication (MTI) approach was reported for detecting moving personnel inside wood and cinderblock structures, moving personnel walking in nonlinear trajectories, and multiple moving personnel walking in linear trajectories.
A time-domain approach to MTI was considered as an alternative to a frequency-domain approach, i.e., Doppler processing, since a very small Doppler shift in backscattered frequency is generated due to (1) the slow motion of the mover and (2) the low frequency needed to penetrate through the wall. The reported time-domain processing algorithms are based on the change detection (CD) paradigm, which is inherently similar to clutter cancellation. In the CD paradigm, the Synchronous Impulse Reconstructive (SIRE) radar remains stationary and generates a set of images for a region of interest (ROI). Each image in the set is formed every two-thirds of a second. The stationary objects in the building remain in the same location in each image; however, moving personnel will be at different locations. The moving personnel can be detected by subtracting adjacent images in the set, thereby eliminating the stationary objects and identifying the MT signature. Additional processing is needed to enhance the MT signature and includes a constant false alarm rate (CFAR) algorithm, morphological processing, k-Means clustering, and a tracking algorithm. CFAR and morphological processing are approaches used to eliminate imaging artifacts and potential false alarms due to target multi-bounce effects. The k-Means clustering algorithm is used to identify centroids for given input clusters, where the clusters are produced by the CFAR and morphological processing algorithms. The tracker is used to establish a trajectory of the MT based on the input centroids.
By way of background, Synchronous Impulse Reconstruction (SIRE) Radar is a low-frequency, ultra-wideband (UWB) radar having a frequency range of 300 MHz˜3 GHz. An example of SIRE system is illustrated in FIG. 1, showing 2 transmitters and 16 receivers in an antenna array 2 m wide having an average power of 5 mW with a downrange swath is 10-meters and a downrange resolution is 0.056 meters.
SUMMARY OF THE INVENTION
A preferred embodiment of the present invention comprises a cluster prediction algorithm for a system to automatically detect and track moving personnel inside buildings. The novel cluster prediction algorithm, inter alia, 1) automatically determines the number of clusters in an image (where each cluster corresponds to a potential moving target), 2) reduces false alarms, and 3) automates the entire moving target indication (MTI) system. This fully automated MTI system can be utilized to detect and track hostile personnel, enemy snipers, or hostages inside buildings. The MTI system could also be used for commercial applications that include: 1) law enforcement, 2) search and rescue, 3) building surveillance, 4) vehicle tracking on highways or in remote locations. The MTI system effectively combines several algorithms in a novel way to image slow and fast moving personnel from 6 m to 30 m inside building structures. The MTI system has successfully demonstrated detection capabilities of personnel walking inside wood and cinderblock buildings.
The moving target indication (MTI) system is comprised of two main components. The first component detects potential moving targets by generating a time series of binary images that contain clusters. The second component of the MTI system tracks the centroid of each cluster thereby indicating any moving target in the building. Both components have been studied individually in past research, but could not be combined since the second component requires manual input. Specifically, the number of clusters in the binary images (output of the first component) is unknown and must be manually input into the second component of the system.
As reported in A. Martone, et al., “Clustering Analysis of Moving Target Signatures,” Proceedings of the SPIE Conference on Radar Sensor Technologies XIV, Orlando, Fla., April 2010 (hereby incorporated by reference) a cluster prediction algorithm has been developed. The cluster prediction algorithm i) automatically determines the number of clusters present in the binary images, ii) reduces false alarms in the binary images, iii) combines the first and second components of the MTI system thereby automating the entire MTI system. The cluster prediction algorithm is a novel, necessary, and unique contribution to the MTI system.
A preferred method of detecting moving targets comprises transmitting electromagnetic waves rays from a plurality of transmitters at sequential; receiving reflected waves into a plurality of receivers after each transmission; the compilation of the reflected waves from the plurality of receivers for each transmission representing a data frame; forming a signal that monitors changes between the two sets of frames; at least one processor operating to process and compare frames; forming a difference image using a back-projection algorithm; scanning the difference image using a constant false alarm rate (CFAR) window; the CFAR window scanning the entire difference image and identifying a list of points of interest and eliminating the sidelobe artifacts present in the difference image thereby creating CFAR images; processing the CFAR images using morphological processing to create a morphological image; determining the number of clusters present in the morphological image; using K-means clustering to indicate the centroid of each cluster; and tracking using a Kalman filter.
A preferred embodiment system for detecting moving targets comprises a plurality of M transmitters, a plurality of receivers, and at least one memory, the transmitters operating in sequence to transmit electromagnetic waves rays sequentially; the receivers receiving reflected waves after each transmission; the compilation of the reflected waves from the plurality of receivers for each transmission representing a data frame; at least one processor operating to perform the steps of: forming a signal that monitors changes between the two sets of frames; at least one processor operating to process and compare frames; forming a difference image using a back-projection algorithm; scanning the difference image using a constant false alarm rate (CFAR) window; the CFAR window scanning the entire difference image and identifying a list of points of interest and eliminating the sidelobe artifacts present in the difference image thereby creating CFAR images; processing the CFAR images using morphological processing to create a morphological image; determining the number of clusters present in the morphological image; using K-means clustering to indicate the centroid of each cluster; and tracking using a Kalman filter.
These and other aspects of the embodiments herein will be better appreciated and understood when considered in conjunction with the following description and the accompanying drawings. It should be understood, however, that the following descriptions, while indicating preferred embodiments and numerous specific details thereof, are given by way of illustration and not of limitation. Many changes and modifications may be made within the scope of the embodiments herein without departing from the spirit thereof, and the embodiments herein include all such modifications.
BRIEF DESCRIPTION OF THE DRAWINGS
The patent or application file contains at least one drawing executed in color. Copies of this patent or patent application publication with color drawing(s) will be provided by the Office upon request and payment of the necessary fee.
In FIGS. 8-19 the colors represent a decibel range which ranges from red to blue, red being the strongest signal and blue being the weakest.
The embodiments herein will be better understood from the following detailed description with reference to the drawings, in which:
FIG. 1 illustrates a schematic diagram of a vehicle having a synchronous Impulse Reconstruction (SIRE) Radar mounted thereon.
FIG. 2 is a block diagram showing a moving target indication system for data collected by a low-frequency UWB radar with correlated illustrations.
FIG. 3 is a block diagram of a is a block diagram showing a moving target indication system for data collected by a low-frequency UWB radar including cluster prediction.
FIG. 4 illustrates two SAR images (a and b) of a target area with a moving target present; the location of the mover is unknown
FIG. 5 is an illustration of a difference image generated by applying change detection to the SAR images of FIG. 4, wherein the moving target signature is identifiable.
FIG. 6 schematically illustrates an example of a CFAR window comprising an inner, guard and outer window.
FIG. 7 is a schematic illustration of a CFAR window placed over the MT signature, where the inner window is overlaid on the MT signature and the outer window covers the background of the local area. The inner window contains pixels with higher energy compared with the pixels contained in the outer window.
FIG. 8A is an illustration comprising 6 ATR images with 2 clusters present per ATR image and wherein each “Error Line” corresponds to 1 image;
FIG. 8B is a graphical depiction of a knee point algorithm based upon FIG. 8A.
FIG. 9A is a schematic illustration revealing themorphological image that contains points of interest (POIs). When these images are input into a clustering algorithm, two clusters are identified; the clusters and corresponding centroids are shown.
FIG. 9B is an illustration based upon FIG. 9A when these images are input into a clustering algorithm, two clusters are identified; the clusters and corresponding centroids are shown.
FIG. 10 is block diagram of the k-Means algorithm.
FIG. 11 is a schematic illustration of a k-Means algorithm iteration example for T=2: the red line indicates progression of the first mean vector and the black line indicates progression of the second mean vector; multiple iterations are needed to minimize the error between the POIs and nearest mean vectors.
FIG. 12 is a schematic illustration of images with points of interest present, whereby through a visual inspection of the images, it would appear that two clusters are present (T=2).
FIG. 13 is a schematic graphical illustration showing the knee point for the six images of FIG. 12.
FIG. 14A is a schematic illustration of plots of the NMSOS errors for morphological images that contain T=1 cluster.
FIG. 14B is a schematic illustration of plots of the NMSOS errors for morphological images that contain T=2 clusters.
FIG. 14C is a schematic illustration of plots of the NMSOS errors for morphological images that contain T=3 clusters.
FIG. 14D is a schematic illustration of plots of the NMSOS errors for morphological images that contain T=4 clusters.
FIG. 15 is a schematic block diagram of the adaptive Knee point (KP) algorithm.
DETAILED DESCRIPTION OF PREFERRED EMBODIMENTS
The embodiments herein and the various features and advantageous details thereof are explained more fully with reference to the non-limiting embodiments that are illustrated in the accompanying drawings and detailed in the following description. Descriptions of well-known components and processing techniques are omitted so as to not unnecessarily obscure the embodiments herein. The examples used herein are intended merely to facilitate an understanding of ways in which the embodiments herein may be practiced and to further enable those of skill in the art to practice the embodiments herein. Accordingly, the examples should not be construed as limiting the scope of the embodiments herein.
The preferred embodiment moving target indication (MTI) system is comprised of two main components. The first component detects potential moving targets by generating a time series of binary images that contain clusters. The second component of the MTI system tracks the centroid of each cluster thereby indicating any moving target in the building. Both components have been studied individually in past research reported in A. Martone, et al., “Automatic Through the Wall Detection of Moving Targets using Low-Frequency Ultra-Wideband Radar,” Proceedings of the IEEE international radar conference, Washington, D.C., May 2010, A. Martone, et al., “An Analysis of Clustering Tools for Moving Target Indication; ARL-TN-5037; U.S. Army Research Laboratory: Adelphi, Md., November 2009, A. Martone, et al., “Through the wall detection of slow moving personnel,” Proceedings of the SPIE conference on Radar Sensor Technology XIII, vol. 7308, Orlando, Fl, April 2009, and A. Martone, et al., “Moving Target Indication for Transparent Urban Structures,” ARL-TN-4809; U.S. Army Research Laboratory, Adelphi, Md., May 2009, all of which are hereby incorporated by reference. However, the individual components could not be combined since the second component requires manual input. Specifically, the number of clusters in the binary images (output of the first component) is unknown and must be manually input into the second component of the system.
In recent research reported in A. Martone, K. Ranney, R. Innocenti, “Clustering analysis of moving target signatures,” in Proceedings of the SPIE conference on Radar Sensor Technology XIV, Orlando, Fl, April 2010, hereby incorporated by reference, a cluster prediction algorithm has been developed. The cluster prediction algorithm i) automatically determines the number of clusters present in the binary images, ii) reduces false alarms in the binary images, iii) combines the first and second components of the MTI system thereby automating the entire MTI system. The cluster prediction algorithm is a novel, necessary, and unique contribution to the MTI system.
To identify moving personnel inside buildings, a time-domain processing system is utilized that utilizes a low-frequency, ultra-wideband (UWB) radar. A low-frequency, UWB radar is desired since the low-frequency transmit pulse is capable of penetrating the wall, as reported in Farwell, M., et al., “Sense through the wall system development and design considerations,” J. of the Franklin Institute September 2008, 345 (6), 570-591, hereby incorporated by reference, and the ultra-wideband corresponds to a high range resolution that gives the capability to better locate the moving target. The time-domain approach to moving target indication (MTI) is utilized as an alternative to a frequency-domain approach, i.e. Doppler processing, since a very small Doppler shift in backscattered frequency is generated due to: 1) the slow motion of the mover and 2) the low frequency needed to penetrate the wall.
The MTI system is shown in FIG. 3. The MTI processing system consists of the following processing routines: change detection, image formation via a specially adapted version of the back-projection algorithm, constant false alarm rate (CFAR) processing, morphological processing, cluster prediction, k-Means clustering, and tracking via the Kalman filter. Each processing routine is described in detail in the following. As discussed, the cluster prediction algorithm has recently been researched and is a novel contribution to the MTI processing system.
The cluster prediction algorithm i) automatically determines the number of clusters present in the binary images, ii) reduces false alarms in the binary images, iii) combines the detection and tracking components of the MTI system thereby automating the entire system.
Change Detection
The constituent radar in our MTI system remains stationary and measures the energy reflected from an area under surveillance. Downrange profiles are measured and buffered by each receive channel for a single set of transmit pulses. Since the transmitters fire in sequence, M downrange profiles are effectively buffered (one for each transmitter) from each receive channel, and the time required to assemble these profiles represents one frame of data. After buffering the data from one frame, another M downrange profiles are collected from each receive channel for the next frame of data.
Next, the coherent difference between these newly collected profiles is formed and the corresponding buffered profiles are formed to obtain a new data set consisting of modified downrange profiles defined by
{dot over (f)} i,j,k(r)=f i+1,j,k(r)f i,j,k(r),i=1, . . . ,N−1,j=1, . . . ,M, and k=1, . . . ,Nc.  (1)
Here r represents the downrange index, i represents the time index, j represents the transmitter index, and k represents the receiver index. Hence, a signal is formed that monitors changes between the two sets of downrange profiles measured at time i and time i+1 using transmitter j and receiver k; hence, the name of the model is a “change detection” (CD) paradigm. The difference signal, {dot over (f)}i,j,k(r) (corresponding to the derivative in time), is then input to an image formation routine, in this case a time-domain back-projection procedure, resulting in the output difference image,
I diff ( x , y ) = k = 1 N c j = 1 M i = 1 N - 1 g ( i , j , k ) f . i , j , k ( r i , j , k ) , ( 2 )
where g(i,j,k) is a scaling function. To illustrate the effectiveness of the CD approach, the SAR images in FIG. 4, parts A and B are considered. The SAR images are focused on the same target area at different moments in time without forming the difference, and one person is moving within the target area. SAR Image 1, I1(x,y), was focused by a back-projection procedure using downrange profiles {f1,1,1(r), . . . f,1,1,16(r)}. SAR Image 2, I2(x,y), was focused by a back-projection procedure using downrange profiles {f2,1,1(r), . . . f2,1,16(r)}. As is evident, the SAR images contain several artifacts making it difficult to identify the moving target. The moving target is located by applying change detection. The resulting difference image is shown in FIG. 5. It is clear from the difference image that most of the artifacts due to stationary clutter have been eliminated and the resulting MT signature is identified.
Constant False Alarm Rate (CFAR) Approach
Interpretation of the resulting MT signature is still challenging after change detection. For example, change detection cannot automatically identify the MT signature located in the difference image and the MT signature can only be identified through visual inspection of a sequence of difference images. Therefore, it is not possible to implement additional signal processing techniques like classification using a single difference image. Another challenge with change detection is that sidelobe artifacts are produced in the difference image, which confuse the true moving target location.
A way to improve user interpretation of the resulting difference image is to apply the CFAR algorithm. CFAR is a well-established approach to eliminating potential false alarms. Typically, the algorithm performs a test of local contrast that is designed to achieve a constant false alarm rate as reported in Gandhi, P. P. & Kassam, S. A., “Analysis of CFAR Processors in Homogeneous Background,” IEEE Transactions on Aerospace and Electronic Systems July 1988, 24 (4), 427-445, hereby incorporated by reference. For a given difference image Idiff (x,y), a CFAR window is used to scan the difference image and test for the MT signature. An example of a CFAR window is shown in FIG. 6, where IX and IY are the inner windows' cross-range and range dimensions, respectively; GX and GY are the guard windows' cross-range and range dimensions; and OX and OY are the outer windows' cross-range and range dimensions. The inner window dimensions are designed so that it is overlaid on the MT signature. When the inner window is overlaid on the MT signature, the outer window dimensions are designed to be superimposed on the local background. The guard window is used as a buffer between the inner and outer windows and ensures that large pixel values due to target sidelobes are not captured by the outer window. For example, consider the window that is placed in the difference image shown in FIG. 7. As is illustrated in the figure, the inner window is overlaid on the MT signature pixels and the outer window is overlaid on the local background pixels.
Based on observations and analysis of the MT signatures, the following dimensions for the CFAR window were selected: IX=7, IY=9, GX=23, GY=25, OX=27, OY=29 (note that a 1×1 pixel equals 0.04×0.04 meters). It is of interest to note that the dimensions of the inner window constitute a small rectangular shape, which is different from the elliptical patterns of the MT signatures. The rectangular shape is chosen since it is small enough to fit over the MT signatures. The small rectangular window is used as an alternative to an elliptical window since the size and shape of the pattern of the moving target changes depending on the range and cross-range of the mover's position.
The CFAR window is placed in the difference image of size (500,500) and moved pixel by pixel over the entire difference image. Let the center of the CFAR window be positioned at coordinates (X, Y) in the difference image, where Xε{┌X/2┐, . . . (500−└OX/2┘)} and Yε{┌OY/2┐, . . . (500−└OY/2┘)}. The notation └x┘ denotes the largest integer less than x for x>0 (i.e., floor), and ┌x┐ denotes the smallest integer greater than x for x>0 (i.e., ceiling). The CFAR algorithm indicates an MT signature if the sum of the energy in the inner window is larger than the sum of the energy in the outer window. This is shown in FIG. 7, where the energy of the pixels in the inner window is larger then the energy of the pixels in the outer window. The inner window to outer window energy ratio is defined as
R = μ i μ o , where ( 3 ) μ i k l [ Φ ( P ( l , k ) ) ] 2 ( 4 )
is the sum of the energy in the inner window, k=[Y−└IY/2┘, . . . Y+└IY/2┘], l=[X−└IX/2┘, . . . X+└IX/2┘], and P(l,k) is the magnitude of the pixel at position (l,k). Define
Φ ( P ( l , k ) ) = { P ( l , k ) , P ( l , k ) > η η , P ( l , k ) η , ( 5 )
where η=max(Idiff(x,y))/2 and max(Idiff(x,y)) is the maximum pixel magnitude in the difference image. The function Φ(P(l,k)) is used to adjust the image background and require that the magnitude of each pixel is above the threshold defined by η, which is done to prevent errors due to division by very small numbers. Division by very small numbers artificially inflates the ratio defined by equation 3 and causes false positives. The threshold η was chosen based on the observations of the sidelobes corresponding to the MT signature, which are typically less than max(Idiff(x,y))/2 in magnitude. This choice of η eliminates the sidelobes by blending them into the background of the difference image.
The sum of the energy in the outer window is defined as
μ o = E W - E I + G , where E W = m n [ Φ ( P ( n , m ) ) ] 2 ( 6 )
is the sum of the energy in the entire CFAR window, m=[Y−└OY/2┘, . . . Y+└OY/2┘], n=[X−└OX/2┘, . . . X+└OX/2┘], and where EI+G is defined as the sum of the energy in the guard and inner windows such that
E I + G = q r [ Φ ( P ( r , q ) ) ] 2 ( 7 )
where q=[Y−└GY/2┘, . . . Y+└GY/2┘] and r=[X−└GX/2┘, . . . X+└GX/2┘]. A CFAR test is defined as
Ψ = { 1 R > 2 0 else , ( 8 )
which requires that the sum of the energy in the inner window is more than twice the sum of the energy in the outer window. If Ψ=1, then the center pixel (at coordinates (X,Y)) is a POI corresponding to an assumed moving target. The CFAR window scans the entire difference image and a list of POIs are identified. For example, consider the difference image and CFAR image of FIGS. 8A and 8B. The difference image is input into the CFAR algorithm and the CFAR image is output. The red cluster in the CFAR image corresponds to a group of POIs. This example illustrates that the CFAR algorithm identifies the MT signature and eliminates the sidelobe artifacts present in the difference image.
Next, morphological processing is applied to further refine the number of clusters present in the CFAR images. The morphological processing considered implements a dilation and erosion procedure. Dilation is used to grow the POI clusters and erosion is used to shrink the POI clusters. The dilation process is designed to connect clusters in close proximity by dilating all pixels in each CFAR image. For dilation define a 17×17 dilation window χd is defined as:
[ χ d ] 17 , 17 = [ 1 1 1 1 ]
The 17×17 dilation window size was chosen to connect clusters separated by a distance of 0.68 m or less (this distance was chosen based on observations of the clusters in the CFAR images). Similar to CFAR, a dilation test statistic is defined:
Ψ d = { 1 , α = 1 17 β = 1 17 χ d ( α , β ) · C i ( j + α - 1 , k + β - 1 ) > 0 0 , else ( 9 )
for all j=1, . . . 484 and k=1, . . . 484. When the dilation window scans the CFAR image, an 8 pixel buffer exists along the edge of the CFAR image (i.e. not enough samples exist at the edges of the image). There exist i=1, . . . N−1 dilation images; one for each CFAR image. If Ψ=1 for a given i, j, k then a dilation occurs and Di(j+8, k+8)=1, where Di(x,y) is a dilation image of size (500×500). If Ψd=0, then Di(j+8, k+8)=0, and no dilation occurs.
Next, an erosion procedure is applied to reduce the size of the clusters in the dilation image back to their original size in the CFAR image. Any clusters joined using the dilation process will remain joined after the erosion process. For erosion, a 17×17 erosion window χe is defined as:
[ χ e ] 17 , 17 = [ 0 0 1 0 0 0 0 0 0 1 1 1 0 0 0 0 0 0 1 0 0 ]
Similar to the dilation procedure, the erosion test statistic is defined as
Ψ e { 1 γ = Ω 0 else where ( 10 ) γ = α = 1 17 χ e ( α , 9 ) · D i ( j + α - 1 , k + 8 ) + β = 1 17 χ e ( 9 , β ) · D i ( j + 8 , k + β - 1 ) ( 11 )
and Ω=34 is the erosion threshold, j=1, . . . 484, and k=1, . . . 484. There exist i=1, . . . N−1 erosion images; one for each dilation image. If Ψe=1 for a given i, j, k, then Ei(j+8, k+8)=1, where Ei(x,y) is an erosion image of size (500×500). If Ψe=0, then an erosion occurs and Ei(j+8, k+8)=0. The set of erosion images, {E1(x,y) . . . EN-1(x,y)}, is referred to as the morphological output images.
Clustering Analysis
The k-Means algorithm is referenced Wilpon, J., et al., “A Modified K-means Clustering Algorithm for Use in Isolated Work Recognition,” IEEE Transactions on Acoustics, Speech and Signal Processing vol. 33, no. 3, July 1985, 587-594, hereby incorporated by reference. Note that the k-Means algorithm requires the number of clusters present in the morphological images and is provided by the cluster prediction algorithm described in the section entitled Cluster Prediction Algorithm. A cluster is defined as a group of one or more POIs that are close to one another in the image. The total number of clusters present in the morphological image referred to as T. For example, consider the POIs in FIG. 9A, a morphological image where each POI corresponds to a blue diamond. When these images are input into a clustering algorithm, two clusters are identified; the clusters and corresponding centroids are shown in FIG. 9B. The POIs connected to each other form a cluster as illustrated in FIG. 9B. As is shown, T=2 clusters are present in the morphological image. Once the number of clusters in the image is known, the k-Means algorithm is used to indicate the centroid of each cluster.
The k-Means algorithm identifies the centroids of the POIs by an iterative procedure. This iterative procedure minimizes the square-error between centroid estimates and their corresponding POIs. It should be noted that the clusters identified by the clustering algorithm are not unique and it is possible that the centroid locations differ for different iterations of the clustering algorithm. A block diagram of the k-Means algorithm is shown in FIG. 10.
The input morphological image contains a set of M POI vectors, where each vector is of size two and contains range and cross-range position information. The k-Means algorithm begins by randomly generating T mean vectors and defining each mean vector to be a centroid location. Note that, at this point, T is unknown and must be manually defined. The adaptive KP algorithm can be leveraged to automatically determine T. The next step of the k-Means algorithm determines the mean vector nearest to each POI using the Euclidean distance measure. An error (offset) is then estimated between the mean vector and nearest POIs using the sum of squares (SOS) error criteria as referenced in Duta, R, et al., “Pattern Classification,” 2nd ed. John Wiley and Sons Inc.: New York, N.Y., 2001, hereby incorporated by reference. This SOS error criterion is a measure of variance between the POI vectors and the nearest mean vectors and must be minimized. Once minimized, the SOS error indicates the final centroid estimates represented by the mean vectors. For example, consider the morphological image in FIG. 11. In this example, two mean vectors were randomly generated and indicated by the red diamond and black star. As the k-Means algorithm iterates, several centroids are estimated. Each newly generated estimate corresponds to a smaller SOS error.
Illustrated in FIG. 11 is a k-Means algorithm iteration example for T=2. The red line indicates progression of the first mean vector and the black line indicates progression of the second mean vector. Multiple iterations are needed to minimize the error between the POIs and nearest mean vectors.
Tracker Algorithm
The tracker algorithm is intended to reduce the number of false alarms and segregate targets from both clutter and one another as they move inside a building. The centroids generated by the clustering algorithm serve as inputs to the tracker; so it is possible to have multiple tracker inputs even when a single moving target is present. These centroids may indicate the true position of a moving target or false alarms. The tracker estimates the correlation between each centroid and the existing tracks and then associates the existing tracks with the most highly correlated (i.e., most reasonable) centroid. Non-assigned centroids are used to initiate new tracks and outdated tracks are deleted. A Kalman filter determines the present track position and predicts the next measurement.
Cluster Prediction Algorithm—the Adaptive Knee-Point Algorithm
The Knee-Point (KP) algorithm (i.e. non-adaptive) is one approach to automatically determine T for a particular morphological image. The KP algorithm is a heuristic approach used to determine the optimal number of clusters as referenced in Thorndike, R. “Who belongs in the family?” Psychometrika December 1953, 18 (4), 267-276, and Zhao, Q. et al. “Knee Point Detection on Bayesian Information Criteria,” Proceedings of the 20th IEEE International Conference on Tools with Artificial Intelligence, vol. 2, November 2008, 431-438, hereby incorporated by reference. The KP algorithm begins by repeating the k-Means algorithm for many different cluster number choices, where the maximum cluster number is denoted by C. This will produce a set of minimized SOS errors Ĵ={Ĵ1, Ĵ1, . . . ĴC}, where ĴN is the Nth minimized SOS error, and N=1, 2, . . . C denotes the cluster number choice. Ĵ is normalized by max(Ĵ) to obtain:
J={ J 1 , J 2 , . . . J C }=Ĵ/max(Ĵ)  (12)
where J i is the ith normalized minimized SOS (NMSOS) error. A heuristic used to identify the number of clusters searches for a large drop in NMSOS error, i.e., the “knee-point.” For example, consider the images shown in FIG. 11. By visual inspection it would appear that two clusters are present in the images (i.e., T=2). The NMSOS errors for each image of FIG. 12 are plotted in FIG. 13, where N=1, . . . C. As is shown in FIG. 14, a large gap exists between N=1 and N=2, thereby indicating that the predicted number of clusters, Np, is 2. Np=2 correctly corresponds to the true number of clusters, T, in the images. Shown in FIG. 12 are images with POIs present. Through a visual inspection of the images, it would appear that two clusters are present (T=2).
In the previous research article A. Martone, et al., “An Analysis of Clustering Tools for Moving Target Indication,” ARL-TN-5037; U.S. Army Research Laboratory: Adelphi, MD, November 2009, the KP algorithm was used (without the proposed training adaptation) to identify the number of clusters present in the morphological images. It was determined that the knee-point indicated by the KP algorithm is ambiguous. For example, consider the NMSOS errors illustrated in FIGS. 14A-D, which illustrates plots of the NMSOS errors organized for different values of T. These NMSOS errors were estimated using the KP algorithm on data collected by the SIRE radar. As is shown in FIG. 14B, some NMSOS errors clearly indicate that two clusters are present. However, other NMSOS errors in FIG. 14B resemble those illustrated in FIG. 14A where T=1.
The ambiguity of the NMSOS errors motivates the need to adapt the KP algorithm to include training information. The training information consists of NMSOS errors obtained by the KP-algorithm. In addition, each NMSOS error in the training set contains a label, θε{1, . . . C}, indicating T. The training set therefore consists of a set of M training vectors, [{J11}, . . . {JMM}], consisting of the NMSOS errors and their corresponding labels, where Ji={ J i,1, . . . J i,C} (equation 12) is a set of NMSOS errors. A block diagram of the adaptive KP algorithm is shown in FIG. 15. For a given morphological image with an unknown number of clusters, the NMSOS errors are first determined and denoted as Jmorph={Jmorph,1, . . . Jmorph,C}. The k-Nearest Neighbor (k-NN) classifier then utilizes the training set to automatically determine the number of clusters, i.e. Np, corresponding to the morphological image. The k-NN classifier first estimates the distance between Jmorph and [J1, . . . JM] based on Euclidean distance. The distance values are denoted as [{d11}, . . . {dMM}], where
d i = ( J _ i , 1 - J morph ) 2 + + ( J _ i , C - J morph ) 2 ( 13 )
The distances are then sorted from smallest to largest to produce [{S11}, . . . {SMM}], where S1 corresponds to the smallest distance, θ1 corresponds to the label of the smallest distance, SM corresponds to the largest distance, and θM corresponds to the label of the largest distance. Once sorted, the labels of the K smallest distances, [θ1, . . . θK], are examined based on a majority vote. Define [K1, K2, . . . KC] as a set corresponding to the number of labels in [θ1, . . . θK] of each class (where a class denotes T). For example, if [θ1=1, θ2=1, θ3=1, θ4=1, θ5=2, θ6=2, θ7=3, θ8=3, θ9=3], where C=3, then [K1=4, K2=2, K3=3]. A predicted label can then be determined for Jmorph as:
N p = arg max j [ K j ] ( 14 )
where j={1, . . . C}. For the example described in the above paragraph, Np=1, meaning that the majority of training NMSOS errors indicate that the NMSOS error of Jmorph is from class T=1. The results of the research described in A. Martone, et al., “Clustering analysis of moving target signatures,” in Proceedings of the SPIE conference on Radar Sensor Technology XIV, Orlando, Fl, April 2010, indicate that the adaptive KP algorithm is capable of predicting the number of clusters present in the morphological image. Furthermore, it was shown that the adaptive KP algorithm reduces false alarms present in the morphological image. FIG. 15 is a block diagram of the adaptive KP algorithm.
As used herein, the terminology “target” means a person or persons, or portion thereof, animal or animals, object, or a combination thereof.
As used herein the terminology “point of interest” or “points of interest” refer to an signature or area in the image which appears to be a target but may or may not be a target; i.e., potentially the point of interest may be a target; subject to further processing or testing.
As used herein the terminology “subimage” or “sub image” means a portion of an image (also referred to herein as a patch), or the like.
As used herein, the “energy” corresponds to the intensity of the image pixels.
As used herein the terminology “processor” includes computer, controller, CPU, microprocessor; multiprocessor, minicomputer, main frame, personal computer, PC, coprocessor, and combinations thereof or any machine similar to a computer or processor which is capable of processing algorithms.
As used herein the terminology the terminology “process” means: an algorithm, software, subroutine, computer program, or methodology.
As used herein, the terminology “algorithm” means: sequence of steps using computer software, process, software, subroutine, computer program, or methodology.
The foregoing description of the specific embodiments are intended to reveal the general nature of the embodiments herein that others can, by applying current knowledge, readily modify and/or adapt for various applications such specific embodiments without departing from the generic concept, and, therefore, such adaptations and modifications should and are intended to be comprehended within the meaning and range of equivalents of the disclosed embodiments. It is to be understood that the phraseology or terminology employed herein is for the purpose of description and not of limitation. Therefore, while the embodiments herein have been described in terms of preferred embodiments, those skilled in the art will recognize that the embodiments herein can be practiced with modification within the spirit and scope of the appended claims.

Claims (19)

What is claimed is:
1. A method of detecting moving targets comprising:
transmitting electromagnetic waves rays from a plurality of transmitters at sequential intervals;
receiving reflected waves into a plurality of receivers after each transmission; the compilation of the reflected waves from the plurality of receivers for each transmission representing a data frame;
forming a signal that monitors changes between the two sets of frames; at least one processor operating to process and compare frames;
forming a difference image using a back-projection algorithm;
scanning the difference image using a constant false alarm rate (CFAR) window; the CFAR window scanning the entire difference image and identifying a list of points of interest and eliminating the sidelobe artifacts present in the difference image thereby creating CFAR images;
processing the CFAR images using morphological processing to create a morphological image;
using K-means clustering to generate normalized minimized sum of squares (NMSOS) errors for the current morphological image, determining the number of clusters present in the morphological image by comparing the NMSOS errors for the current morphological image with a database of known NMSOS errors from previously inputted morphological images associated with known cluster numbers and determining the closest match;
using K-means clustering to indicate the centroid of each cluster; and
determining the presence or path of a target.
2. The method of claim 1 wherein the step of forming a signal comprises
forming the coherent difference between newly collected data profiles and the stored data profiles to obtain a new data set consisting of modified downrange profiles using the equation {dot over (f)}i,j,k(r)=fi+1,j,k(r)−fi,j,k(r), i=1, . . . , N−1, j=1, . . . , M, and k=1, . . . , Nc where M represents the number of transmitters, r represents the downrange index, i represents the time index, j represents the transmitter index, and k represents the receiver index, the difference signal, N is the total number of frames, and Nc the total number of clusters; {dot over (f)}i,j,k(r) being formed to monitor changes between the two sets of downrange profiles measured at time i and time i+1 using transmitter j and receiver k; and
the step of forming an image using a back projection algorithm comprises inputting the difference signal {dot over (f)}i,j,k(r) into an image formation routine which is a time-domain back-projection procedure, resulting in the output difference image
I diff ( x , y ) = k = 1 Nc j = 1 M i = 1 N - 1 g ( i , j , k ) f . i , j , k ( r i , j , k )
where g(i,j,k) is a scaling function.
3. The method of claim 2 wherein the step of processing using the constant false alarm rate (CFAR) comprises performing a test of local contrast using a difference image Idiff(x,y),
setting a CFAR window used to scan the difference image and test for the moving target signature; the CFAR window comprising:
an inner window having the cross range dimension Ix and range dimension Iy,
a guard window having the cross range dimension Gx and range dimension Gy,and
an outer window having the cross range dimension Ox and range dimension Oy,and
wherein the inner windows dimensions are overlaid on the moving target signature, the outer window dimensions are superimposed on the background, and the guard window is used as a buffer between the inner and outer windows and ensures that large pixel values due to target sidelobes are not captured by the outer window.
4. The method of claim 3 wherein the step of processing using the constant false alarm rate (CFAR) comprises:
placing the CFAR window in the difference image of a predetermined size less than the difference image and moved, pixel by pixel over the entire difference image; and locating a moving target signature if the sum of the energy in the inner window is larger than the sum of the energy in the outer window.
5. The method of claim 4 wherein the inner window to outer window energy ratio is defined as
R = μ i μ o
where
μ i = k l [ Φ ( P ( l , k ) ) ] 2
 is the sum of the energy in the inner window, k=[Y−└IY/2┘, . . . Y+└IY/2┘], l=[X−└IX/2┘, . . . X+└IX/2┘], and P(i,k) is the magnitude of the pixel at position (l,k) the function Φ(P(i,k)) is defined as
Φ ( P ( l , k ) ) = { P ( l , k ) , P ( l , k ) > η η , P ( l , k ) η
 where η=max(Idiff(x,y))/2 and max(Idiff(x,y)) is the maximum pixel magnitude in the difference image, and wherein Φ(P(i,k)) is used to adjust the image background and require that the magnitude of each pixel is above the threshold defined by η, such that errors are prevented due to division by very small numbers, and wherein the threshold η is chosen based on the observations of the sidelobes corresponding to the moving target signature, which are typically less than max(Idiff(x,y))/2 in magnitude, and wherein the choice of η eliminates the sidelobes by blending them into the background of the difference image and wherein the sum of the energy μo , in the outer window is defined as
μ o = E W - E I + G , where E W = m n [ Φ ( P ( n , m ) ) ] 2
is the sum of the energy in the entire CFAR window, m=[Y−└OY/2┘, . . . Y+└OY/2┘], n=[X−└OX/2┘, . . . X+└OX/2┘], and EI+G is defined as the sum of the energy in the guard and inner windows, such that
E I + G = q r [ Φ ( P ( r , q ) ) ] 2
where q=[Y−└GY/2┘, . . . Y+└GY/2┘] and r=[X−└GX/2┘, . . . X+└GX/2┘]; and wherein a CFAR test is defined as
Ψ = { 1 R > 2 0 else ,
which requires that the sum of the energy in the inner window is more than twice the sum of the energy in the outer window;
whereby if Ψ=1, then the center pixel (at coordinates (X, Y)) is a point of interest corresponding to a potential moving target.
6. The method of claim 1 wherein targets are detected inside wood and/or cinderblock buildings.
7. The method of claim 1 wherein the step of processing the CFAR images using morphological processing operates to refine the number of clusters present in the CFAR images and implements a dilation procedure and an erosion procedure.
8. The method of claim 7 wherein the dilation procedure is designed to connect clusters in close proximity by dilating all pixels in each CFAR image by defining a dilation window xd as:
[ χ d ] 17 , 17 = [ 1 1 1 1 ]
where the 17×17 dilation window size was chosen to connect clusters separated by a distance of 0.68 m or less, a distance was chosen based on observations of the clusters in the CFAR images, and wherein a dilation test statistic is defined:
Ψ d = { 1 , α = 1 17 β = 1 17 χ d ( α , β ) · C i ( j + α - 1 , k + β - 1 ) > 0 0 , else
for all j=1, . . . 484 and k=1, . . . 484, such that when the dilation window scans the CFAR image, Ci(x,y), an 8 pixel buffer exists along the edge of the CFAR image wherein there are not enough samples exist at the edges of the image and where there exist i=1, . . . N−1 dilation images; one for each CFAR image such that if Ψd=1 for a given i, j, k then a dilation occurs and Di(j+8,k+8)=1, where Di(x,y) is a dilation image of size (500×500) and if Ψd=0, then Di(j+8, k+8)=0, and no dilation occurs.
9. The method of claim 7 wherein the erosion procedure is utilized to reduce the size of the clusters to their original size in the CFAR image; any clusters joined using the dilation process remaining joined after the erosion process, the erosion procedure comprising:
defining a 17×17 erosion window xe as
[ χ e ] 17 , 17 = [ 0 0 1 0 0 0 0 0 0 1 1 1 0 0 0 0 0 0 1 0 0 ]
and wherein the erosion test statistic is defined as
Ψ e = { 1 γ = Ω 0 else
 where
γ = α = 1 17 χ e ( α , 9 ) · D i ( j + α - 1 , k + 8 ) + β = 1 17 χ e ( 9 , β ) · D i ( j + 8 , k + β - 1 )
and Ω=34 is the erosion threshold, j=1, . . . 484, and k=1, . . . 484 such that there exist i=1, . . . N−1 erosion images; one for each dilation image, Di,(x,y), and if Ψe=1 for a given i, j, k, then Ei(j+8, k+8)=1, where Ei(x,y) is an erosion image of size (500×500) and if Ψe=0, then an erosion occurs and Ei(j+8, k+8)=0 and wherein the set of erosion images, {E1(x,y) . . . EN−1(x,y)}, is referred to as the morphological output images.
10. The method of claim 1 wherein the step of determining the number of clusters present in the morphological image comprises
defining a cluster as a group of one or more points of interest that are close to one another in the morphological image;
identifying the number of clusters present in the morphological image.
11. The method of claim 10 wherein the step of using the k-Means processing comprises using an iterative procedure for minimizing the square-error between centroid estimates and their corresponding points of interest; the k-means processing comprising
inputting the morphological image comprising a set of points of interest vectors, and a number representing the number of clusters into at least one processor to randomly generate a mean vector;
randomly generating T mean vectors correlating to a cluster centroid location;
using an iterative procedure to
a) determining the mean vector nearest to each point of interest vector using the Euclidean distance measure;
b) estimating the error between the point of interest and the corresponding mean vector using a sum of squares error criterion, the error criterion being it measure of the variance between the points of interest vectors and the nearest mean vectors in order to minimize the error;
c) determining whether the error is greater than a predetermined value;
d) if the error is greater than a predetermined value, updating using mean vectors nearest points of interest and return to step a);
e) if the error is less than a predetermined value, then the final centroid estimates are represented by the mean vectors.
12. The method of claim 1 wherein the step of determining the presence or path of a target comprises using a tracker algorithm to reduce the number of false alarms and segregate targets from both clutter and one another as they move inside a building; wherein the centroids generated by the clustering algorithm serve as inputs to the tracker; so that it is possible to have multiple tracker inputs even when a single moving target is present in that the centroids may indicate the true position of a moving target or false alarms; the tracker algorithm operating to estimate the correlation between each centroid and the existing tracks and associate the existing tracks with the most highly correlated centroid, whereby non-assigned centroids are used to initiate new tracks and outdated tracks are deleted and the tracker algorithm determines the present track position and predicts the next measurement.
13. The method of claim 1 wherein the step of determining the number of clusters present in the morphological image comprises a heuristic approach to determine the number of clusters by:
repeating the k-Means clustering step for many different cluster number choices; wherein the maximum cluster number is denoted by C, to produce a set of minimized SOS errors Ĵ={Ĵ1, Ĵ1, . . . ĴC}, where ĴN is the Nth minimized SOS error, and N=1, 2, . . . C denotes the cluster number choice. Ĵ is normalized by max(Ĵ) to obtain:

J={ J 1 , J 2 , . . . J C }=Ĵ/max(Ĵ)
where J is the ith normalized minimized SOS (NMSOS) error;
searching using a heuristic for a large drop in NMSOS error or “knee-point” where a large gap exists between predicted cluster numbers, thereby indicating that the predicted cluster number corresponds to the true number of clusters.
14. The method of claim 13 wherein the database of known NMSOS errors from previously inputted morphological images comprises training set information and further including the step of labeling each NMSOS error in the training set θε{1, . . . C}, indicating T, such that the training set comprises a set of M training vectors, [{J11}, . . . {JMM}], consisting of the NMSOS errors and their corresponding labels, where Ji={ J i,1, . . . J i,C}.
15. The method of claim 14 wherein for a predetermined morphological image with an unknown number of clusters, the NMSOS errors are first determined and denoted as Jmorph={Jmorph,1, . . . Jmorph,C}, the k-Nearest Neighbor (k-NN) classifier then utilizes the training set to automatically determine the number of clusters, Np, corresponding to the morphological image and the k-NN classifier first estimates the distance between Jmorph and [J1, . . . JM] based on Euclidean distance, denoting the distance values as [{d11}, . . . {dMM}], where
d i = ( J _ i , 1 - J morph ) 2 + + ( J _ i , C - J morph , C ) 2
and the distances are then sorted from smallest to largest to produce [{S11}, . . . {SMM}], where S1 corresponds to the smallest distance, θ1 corresponds to the label of the smallest distance, SM corresponds to the largest distance, and θM corresponds to the label of the largest distance; and subsequent to sorting, the labels of the K smallest distances, [θ1, . . . θK], are examined based on a majority vote to define [K1, K2, . . . KC] as a set corresponding to the number of labels in [θ1, . . . θK] of each class, where a class denotes the number of clusters T.
16. A system for detecting moving targets, the system comprising a plurality of M transmitters, a plurality of receivers, and at least one memory, the transmitters operating in sequence to transmit electromagnetic waves rays sequentially; the receivers receiving reflected waves after each transmission; the compilation of the reflected waves from the plurality of receivers for each transmission representing a data frame; at least one processor operating to perform the steps of:
forming a signal that monitors changes between the two sets of frames; at least one processor operating to process and compare frames;
forming a difference image using a back-projection algorithm;
scanning the difference image using a constant false alarm rate (CFAR) window; the CFAR window scanning the entire difference image and identifying a list of points of interest and eliminating the sidelobe artifacts present in the difference image thereby creating CFAR images;
processing the CFAR images using morphological processing to create a morphological image;
using K-means clustering to generate normalized minimized sum of squares (NMSOS) errors for the current morphological image, determining the number of clusters present in the morphological image by comparing the NMSOS errors for the current morphological image with a database of known NMSOS errors from previously inputted morphological images associated with known cluster numbers and determining the closest match;
using K-means clustering to indicate the centroid of each cluster; and
determining the presence or location of a target.
17. The system of claim 16 wherein the step of comparing the NMSOS errors is performed using a classifier and wherein the step of determining the presence or location of a target comprises using a tracker algorithm to establish a trajectory of the target based on the input centroids.
18. The system of claim 16 wherein point of interest is inside a cinderblock building and wherein the step of determining the presence or location of a target comprises tracking the centroid of each cluster to determine whether there are any moving targets inside the building.
19. The system of claim 16 wherein the step of determining the presence or location of a target comprises using a tracker algorithm to determine target tracks, and further comprising estimating the correlation between centroids and the existing tracks and then associating the existing tracks with the most highly correlated centroid.
US13/008,549 2011-01-18 2011-01-18 System and method for moving target detection Expired - Fee Related US8502731B2 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US13/008,549 US8502731B2 (en) 2011-01-18 2011-01-18 System and method for moving target detection
US13/233,434 US9057783B2 (en) 2011-01-18 2011-09-15 Change detection method and system for use in detecting moving targets behind walls, barriers or otherwise visually obscured

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US13/008,549 US8502731B2 (en) 2011-01-18 2011-01-18 System and method for moving target detection

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US13/233,434 Continuation-In-Part US9057783B2 (en) 2011-01-18 2011-09-15 Change detection method and system for use in detecting moving targets behind walls, barriers or otherwise visually obscured

Publications (2)

Publication Number Publication Date
US20120182173A1 US20120182173A1 (en) 2012-07-19
US8502731B2 true US8502731B2 (en) 2013-08-06

Family

ID=46490368

Family Applications (1)

Application Number Title Priority Date Filing Date
US13/008,549 Expired - Fee Related US8502731B2 (en) 2011-01-18 2011-01-18 System and method for moving target detection

Country Status (1)

Country Link
US (1) US8502731B2 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9075129B2 (en) 2008-12-10 2015-07-07 The United States Of America As Represented By The Secretary Of The Army Method and system for forming images by comparing subsets of image data
US9250323B2 (en) 2008-12-10 2016-02-02 The United States Of America As Represented By The Secretary Of The Army Target detection utilizing image array comparison
US10101436B2 (en) 2014-10-31 2018-10-16 The United States Of America As Represented By The Secretary Of The Army Method and apparatus for bandwidth selection for radar transmission
CN108764144A (en) * 2018-05-29 2018-11-06 电子科技大学 A kind of synthetic aperture radar target detection method based on GPU
CN110738272A (en) * 2019-10-23 2020-01-31 智洋创新科技股份有限公司 method for labeling visualized mechanical continuous alarm samples of power transmission line channel

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107861121A (en) * 2017-09-28 2018-03-30 北京华航无线电测量研究所 A kind of dangerous goods detection method detected based on Gaussian Blur and CFAR
CN110606178B (en) * 2019-10-28 2024-04-23 南京工程学院 Submarine observation underwater robot based on three-eye vision and control method thereof
CN111122945B (en) * 2019-12-31 2022-03-01 南京天溯自动化控制系统有限公司 High-precision alarm filtering method and device for hospital logistics monitoring system
US11373511B2 (en) * 2020-09-14 2022-06-28 PureTech Systems Inc. Alarm processing and classification system and method
US20240103130A1 (en) * 2020-10-29 2024-03-28 Sri International Feature extraction for remote sensing detections
CN112881983B (en) * 2021-01-13 2022-03-15 合肥工业大学 SAR image ship CFAR detection method based on bilateral truncation statistical characteristics
US11635507B2 (en) * 2021-03-03 2023-04-25 Adobe Inc. Systems for estimating three-dimensional trajectories of physical objects
CN113256585B (en) * 2021-05-24 2022-11-11 北京理工大学 Real-time detection method for small infrared video moving target based on space-time tensor decomposition
CN113589251B (en) * 2021-07-29 2024-01-05 上海无线电设备研究所 Unit average constant false alarm detection method after Mean-Shift echo clustering
CN113960558B (en) * 2021-11-24 2023-10-24 成都理工大学 Non-line-of-sight target positioning method and system based on multiple-input multiple-output radar
CN117169887B (en) * 2023-11-03 2024-04-19 武汉能钠智能装备技术股份有限公司 SAR ground moving target positioning method based on direction determination

Non-Patent Citations (18)

* Cited by examiner, † Cited by third party
Title
A. Jain, "Fundamentals of Digital Image Processing," Prentice-Hall International, Englewood Cliffs, NJ, pp. 384-387 (1989).
A. Martone, K Ranney, R. Innocenti, "An Analysis of Clustering Tools for Moving Target Indication," ARL-TN-5037; U. S. Army Research Laboratory: Adelphi, MD, Nov. 2009.
A. Martone, K Ranney, R. Innocenti, "Clustering analysis of moving target signatures," Proceedings of the SPIE conference on Radar Sensor Technology XIV, Orlando, Fl, Apr. 2010.
A. Martone, K. Ranney, R. Innocenti, "Automatic Through the Wall Detection of Moving Targets using Low-Frequency Ultra-Wideband Radar," Proceedings of the IEEE International radar conference, Washington, DC, May 2010.
A. Martone, K. Ranney, R. Innocenti, "Moving Target Indication for Transparent Urban Structures," ARL-TN-4809; U.S. Army Research Laboratory Acielphi, MD, May 2009.
A. Martone, K. Ranney, R. Innocenti, "Through the wall detection of slow moving personnel;" Proceedings the SPIE conference on Radar Sensor Technology XIII, vol. 7308, Orlando, Fl, Apr. 2009.
Anthony Martone ; Kenneth Ranney and Roberto Innocenti "Clustering analysis of moving target signatures", Proc. SPIE 7669, Radar Sensor Technology XIV, 766912 (Apr. 27, 2010); doi:10.1117/12.852549. *
Anthony Martone, Roberto Innocenti, and Kenneth Ranney,"An Analysis of Clustering Tools for Moving Target Indication" ARL-TN-5037; US Army Research Laboratory: Adephi, MD, Nov. 2009. *
Anthony Martone, Roberto Innocenti, and Kenneth Ranney,"An Analysis of Clustering Tools for Moving Target Indication" ARLTN-5037; US Army Research Laboratory: Adephi, MD, Nov. 2009. *
Duta, R.; Hart, P.; Stork, D. "Pattern Classification," 2nd ed. John Wiley and Sons Inc. New York, NY, pp. 542-548 (2001).
Farwell, M., et al., "Sense through the wall system development and design considerations," J. of the Franklin Institute Sep. 2008, 345 (6), 570-591.
Gandhi, P. P et al., "Analysis of CFAR Processors in Homogeneous Background" IEEE Transactions on Aerospace and Electronic Systems Jul. 1988, 24 (4), 427-445.
McCorkle, J. "Focusing of Synthetic Aperture Ultra Wideband Data," Proceedings of the IEEE International Conference on Systems Engineering, Dayton, OH, Aug 1991, 1-5.
Novak, L. "Change Detection for Multi-polarization, Multi-pass SAR," Proceedings of the SPIE Conference on Algorithms for Synthetic Aperture Radar Imagery XII, vol. 5808, Orlando, FL, Mar. 2005, 234-246.
Ressler, M.; et al., "The Army Research Laboratory (ARL) Synchronous Impulse Reconstruction (SIRE) Forward-Looking Radar," Proceedings of the SPIE Conference on Unmanned Systems Technology IX, vol. 6561, Bellingham, WA, Apr. 2007, 658105-1-666105-12.
Thorndike, R. "Who belongs in the family?" Psychometrika Dec. 1953, 18 (4), 267-276.
Wilpon, J., et al., "A Modified K-means Clustering Algorithm for Use in Isolated Work Recognition," IEEE Transactions on Acoustics, Speech and Signal Processing vol. 33, No. 3, Jul. 1985, 587-594.
Zhao, Q.; Xu, M.; Franti, P. "Knee Point Detection on Bayesian Information Criteria," Proceedings of the 20th IEEE International Conference on Tools with Artificial Intelligence, vol. 2, Nov. 2008, 431-438.

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9075129B2 (en) 2008-12-10 2015-07-07 The United States Of America As Represented By The Secretary Of The Army Method and system for forming images by comparing subsets of image data
US9250323B2 (en) 2008-12-10 2016-02-02 The United States Of America As Represented By The Secretary Of The Army Target detection utilizing image array comparison
US10101436B2 (en) 2014-10-31 2018-10-16 The United States Of America As Represented By The Secretary Of The Army Method and apparatus for bandwidth selection for radar transmission
CN108764144A (en) * 2018-05-29 2018-11-06 电子科技大学 A kind of synthetic aperture radar target detection method based on GPU
CN108764144B (en) * 2018-05-29 2021-09-07 电子科技大学 Synthetic aperture radar target detection method based on GPU
CN110738272A (en) * 2019-10-23 2020-01-31 智洋创新科技股份有限公司 method for labeling visualized mechanical continuous alarm samples of power transmission line channel
CN110738272B (en) * 2019-10-23 2020-11-03 智洋创新科技股份有限公司 Method for labeling visual mechanical continuous alarm samples of power transmission line channel

Also Published As

Publication number Publication date
US20120182173A1 (en) 2012-07-19

Similar Documents

Publication Publication Date Title
US8502731B2 (en) System and method for moving target detection
US9057783B2 (en) Change detection method and system for use in detecting moving targets behind walls, barriers or otherwise visually obscured
US8314732B2 (en) Adaptive radar
EP3812791A1 (en) Integration of tracking with classifier in mmwave radar
Chang et al. Human detection and tracking via ultra-wideband (UWB) radar
US20070253625A1 (en) Method for building robust algorithms that classify objects using high-resolution radar signals
US6756935B1 (en) Full polarization ground moving target indicator radar automatic target detection algorithm
US20220179062A1 (en) Detection apparatus and method
CN106468772B (en) A kind of multistation radar human body tracing method measured based on distance-Doppler
Solonskaya et al. Signal processing in the intelligence systems of detecting low-observable and low-doppler aerial targets
Khan et al. An IR-UWB multi-sensor approach for collision avoidance in indoor environments
EP3417311B1 (en) A method for motion classification using a pulsed radar system
Gao et al. Learning to detect open carry and concealed object with 77 GHz radar
US20220260702A1 (en) Radar-Based Target Tracker
Chang et al. An MHT algorithm for UWB radar-based multiple human target tracking
Gurbuz et al. Kinematic model-based human detectors for multi-channel radar
WO2017188905A1 (en) A method for motion classification using a pulsed radar system
Kilaru et al. Gaussian mixture modeling approach for stationary human identification in through-the-wall radar imagery
Lee et al. Background adaptive division filtering for hand-held ground penetrating radar
McDonald Discrimination of human targets for radar surveillance via micro‐Doppler characteristics
Kahler et al. Robust multi-look HRR ATR investigation through decision-level fusion evaluation
Martone et al. Moving target indication for transparent urban structures
Ahmed et al. Robust ground moving target detection for airborne radar using a novel feature-based machine learning approach
Zande 3D Point Cloud Object Detection for Millimeter Wave Radar: a Synthesis Study
Martone et al. Clustering analysis of moving target signatures

Legal Events

Date Code Title Description
AS Assignment

Owner name: ARMY, THE UNITED STATES OF AMERICA AS REPRESENTED

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:MARTONE, ANTHONY F.;RANNEY, KENNTH I.;REEL/FRAME:025699/0902

Effective date: 20110118

STCF Information on status: patent grant

Free format text: PATENTED CASE

FPAY Fee payment

Year of fee payment: 4

FEPP Fee payment procedure

Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

LAPS Lapse for failure to pay maintenance fees

Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

STCH Information on status: patent discontinuation

Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362

FP Lapsed due to failure to pay maintenance fee

Effective date: 20210806